Past Events

2017

Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. More

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-02, 2017 in Frankfurt. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise. More

2016

Workshop

Der neue Datenschutz – Crashkurs für IT-Professionals

In weniger als eineinhalb Jahren tritt die neue Datenschutzgrundverordnung der EU (EU-DSGVO), besser bekannt unter der englischen Abkürzung GDPR (General Data Protection Regulation), in Kraft. Höchste Zeit also, sich mit den Veränderungen zu befassen, die dieses EU-weit geltende Gesetz bringen wird, und insbesondere mit dessen Auswirkungen auf die IT. Dieser eintägige Crashkurs macht Sie fit für die neue Datenschutz-Ära und bewahrt Sie vor unangenehmen Überraschungen. More

Conference

Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access Management (CIAM) is at the heart of Digital Transformation. The Consumer Identity Summit is here to get you kickstarted into the world of CIAM, where you learn from your customers while respecting their privacy needs and securing their personal information against cyber risks. More

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access. More

Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. More

Seminar

Moving Beyond the Hype: EIC 2016 Blockchain Seminar

What is it that creates such a fast and strong hype around the blockchain topic? The fear of missing out the biggest innovation since the internet? The notion that this time it could really be that one big thing turning everything upside down? Anyway, the industry is on the move, following the connected customer into the transformed world of decentralised digital business, where nothing will be as it has been and much of it will be based on blockchains. More

Seminar

How Blockchain Will Influence Your Business

CXP Group and KuppingerCole are pleased to invite you to the first Blockchain Seminar in Paris. The working language of the seminar will be english. More

2015

Seminar

Australasian Next Generation Cyber Security

Digital Disruption & Transformation in Industry and Government A Joint event with the Australian Information Industries Association (AIIA) November 30, 2015 at the RACV Club Melbourne, Australia More

Conference

Next Generation Cyber Security

Die digitale Transformation steht für den Beginn eines Zeitalters, in dem praktisch alle Aspekte unseres Lebens mit Informationstechnologie in Berührung kommen. Cyberangriffe und die damit verbundenen Risiken sind ein fester Bestandteil dieses Zeitalters geworden. Die Chancen der digitalen Wirtschaft dennoch zu nutzen, digitale Risiken richtig einzuschätzen und auf ein sinnvolles Maß zu reduzieren erfordert neue Ansätze: Next Generation Cyber Security. Diese Dialogveranstaltung bietet Ihnen die Möglichkeit, einen Tag mit kreativen Vordenkern zu verbringen und gemeinsam eine Abwehrstrategie zu More

Seminar

Cyber Security in 2015-2016

KuppingerCole (Asia Pacific) is pleased to announce a special Chief Security Officer and Security Analyst afternoon seminar immediately prior to the Australasian Information Security Annual conference (AISA) welcoming drinks. The numbers are strictly limited and a discount rate applies to AISA Members attending the AISA Conference. More

Congress

European Identity & Cloud Conference 2015

European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. More

Business & Technology Breakfast

Executive Breakfast: How best to migrate your Applications to the Cloud

Companies today must manage their migration to the Cloud. Too many organisations find that they are already using Cloud services before they have planned their movement from “on-premise” applications to hosted services. More

Seminar

Executive Luncheon & Seminar: A "Krash" course on Identity & Access Management

This Executive Luncheon & Afternoon seminar will provide an overall view on Identity & Access Management and Identity & Access Governance IAM/IAG and the various subtopics to allow you to - define your own "big picture" for your future IAM infrastructure. More

2014

Leadership Seminar

Migration auf eine neue Identity Provisioning Lösung

Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen. More

Leadership Seminar

Identity Management Crashkurs

Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. More

Leadership Seminar

Federation – Single Sign-On – Cloud IAM

Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. More

Leadership Seminar

Identity Management Crashkurs

Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. More

Leadership Seminar

Federation – Single Sign-On – Cloud IAM

Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren. More

Leadership Seminar

Identity Management Crashkurs

Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. More

Leadership Seminar

Migration auf eine neue Identity Provisioning Lösung

Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen. More

Leadership Seminar

Identity Management Crashkurs

Eine Gesamtsicht auf IAM/IAG und die verschiedenen Teilthemen – Definieren Sie Ihr eigenes „Big Picture“ für Ihre zukünftige IAM Infrastruktur. More

Seminar

KuppingerCole Identity and Access Management Experts Day

Pre-Program: Identity and Access Management - Where to Start? Morning: Access Governance for both on premises applications and Cloud & Mobile Afternoon: Dynamic Externalised Authorisation Management with the move from Role to Policy Based Access control. More

Seminar

Joint Identity Experts Day with the Shenzhen Information Technology Compliance Association

Join us for an Identity and Access Management seminar day jointly supported by KuppingerCole (Asia Pacific) and the Shenzhen IT Compliance Association. More

Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. More

Business & Technology Breakfast

Moving from Prohibition to Trust: Identity Management in the On Premises and Cloud Era

Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. More

Seminar

Identity & Access Management Experts Day

Deep dives into technology & architectures: The Identity & Access Management Experts Day is the place, where you meet with Identity & Access Management experts for in-depth discussion on the future of Identity Management, Cloud Computing and Information Security. More

Business & Technology Breakfast

Managing Identities and Access to Information for Cloud, Mobile and Social Computing

Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now, is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers and to run our enterprises. It is all about the shift of control into the hands of users, far beyond of what we used to call consumerization. Identity and access is the key element in this paradigm shift and this KuppingerCole Business & Technology Breakfast is a great place to discuss these topics. It is More

Business & Technology Breakfast

Moving from Prohibition to Trust: Identity Management in the On Premises and Cloud Era

Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. Join KuppingerCole APAC in this Breakfast Debate to find out how to best move from old school, prohibition based security to trust in access control. More

2013

Business & Technology Breakfast

Moving from Prohibition to Trust in Access Control: Identity Management for Government in the On Premises and Cloud Era

Managing and governing access to systems and information, both on-premise and in the cloud, needs to be well architected to embrace and extend existing building blocks and help organizations moving forward towards a more flexible, future-proof IT infrastructure. Join KuppingerCole APAC in this Breakfast Debate to find out how to best move from old school, prohibition based security to trust in access control. More

Conference

Information Risk & Security Summit 2013

The Information Risk & Security Summit Frankfurt 2013, taking place on November 27 – 28, 2013 at the Frankfurter Innovationszentrum FIZ Conference Lab, Frankfurt/Germany, offers an unseen combination of thought leadership and interactive session formats, tackling the most demanding questions IT professionals are confronted with: How to support the extended & connected enterprise with brilliant services without taking too many too big risks. More

Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. More

2012

Conference

Digital Economics Forum 2012

Mit Macht drängt die „Generation Y“ auf den Arbeitsmarkt und übernimmt Verantwortung in den Unternehmen. Aufgewachsen mit dem Internet, geübt im Umgang mit den neuesten mobilen Gadgets und daran gewöhnt, dass ein neuer Kontakt nur einen Mausklick entfernt ist, egal ob Kollege/Kollegin, Partner, Kunde, Lead, stellen sie CIOs und IT Professionals vor die größten Herausforderungen seit Einführung des Mainframe. Wie lässt sich Informationssicherheit in einer vollständig deperimeterisierten Umgebung erreichen? Wie kann man den bunten Zoo an privaten Endgeräten, der an den Schreibtischen ohnehin More

Training

XACML and the Externalization of Authorization: How to do it Right

This training will give an overview about XACML and the concepts behind, from the way policies are expressed to the different components like PEPs, PDPs, or PAPs. It also will look at the shortcomings XACML currently has and how to best deal with them. It will look at different approaches in which XACML currently is used, showing the breadth and potential limitations of XACML. And it will discuss where to better not use XACML itself but to “translate” things. More

Training

Enterprise Role Management Done Right: How to Successfully Implement Role Management – if you need it

Enterprise Role Management still is a key topic when it comes to efficiently manage large groups of users. The art of clearly defining projects for role discovery and implementation, architecture model development and lifecycle maintenance with regards to scope and resources is your most important takeaway from this training. More

Training

Choosing the Right Cloud

The rise of cloud computing has changed the rules for optimising your IT strategy. However within cloud computing there are many choices. Making the right choices can save time and money making the wrong choices can increase risks. This training will look at how to choose the right cloud for your business need. More

Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. More

2011

Workshop

KuppingerCole Industry Round Table: Cloud Computing und Datenschutzrecht

Seit mehr als 2 Jahren befinden wir uns in einer Cloud Computing Hype-Phase, und ein Ende ist nicht in Sicht. Im Gegenteil: es gibt kaum ein Unternehmen, in dem IT Professionals nicht unter mehr oder weniger starkem Druck ihres Top Managements das Cloud Computing Zeitalter einleuten und bereits die nächste Treibstufe zünden. Mehr Agilität für weniger Geld, wir kennen die für eine Verlagerung der IT in die Cloud einschlägigen Business-Argumente zwischenzeitlich gut genug um zu wissen, dass die Cloud keine vorübergehende Erscheinung sein wird. Doch auch nach 2 Jahren Hype sind die Risiken in More

Workshop

Risiko- und Schutzbedarfsanalysen im Cloud Computing

Wertvolles Expertenwissen zum Kernthema Cloud Security bietet Ihnen dieser halbtägige Intensiv-Workshop, den wir Ihnen während der IT-Security Messe it-sa 2011 (11.-13. Oktober 2011, Halle 12 auf dem Nürnberger Messegelände) bieten. Als Teilnehmer dieses Workshops erhalten Sie eine kostenfreie Eintrittskarte zur IT-Security Messe it-sa 2011. More

Seminar

Trust Framework Model and IdM Summit - produced by Kantara Initiative and OIX

2011 brings new opportunities for identity services in the enterprise & consumer markets. Gain state-of-identity insight through a series of presentations of common scenarios from diverse market leaders. More

Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. More

Seminar

OpenID Summit Munich

The OpenID Foundation's 2011 series of OpenID Summits focus is on use cases and topics of interest to key developers, executives and analysts in the identity industry. The OpenID Summit in Munich will focus on global adoption dynamics and the evolution of OpenID technologies. It is a free event co-sponsored by Google and Microsoft. More

2010

Seminar

Enterprise Cloud Security Summit

Innerhalb weniger Jahre hat sich das Cloud Computing zu einem dominierenden Trend entwickelt, der sich zudem wie kaum ein Trend zuvor verändernd auf die IT-Infrastruktur auswirkt. Im Gegensatz zu typischen, Technologie-getriebenen Trends, geht die Nachfrage nach Cloud Computing Services von den Fachabteilungen aus, bisweilen unter Umgehung der "klassischen" internen IT-Infrastruktur. Für die IT-Abteilungen bedeutet dies, einer ganzen Reihe von neuen Sicherheitsrisiken begegnen zu müssen. Im KuppingerCole Enterprise Cloud Security Summit diskutieren erfahrene Analysten mit Ihnen darüber, wie More

Conference

The Experts Conference Europe

The Experts Conference (TEC) Europe is coming to Düsseldorf in 2010! TEC 2010 Europe delivers world-class training and networking - for the experts, by the experts - and teaches better, more innovative ways to run and manage the technologies that drive your organization every day! In addition to its highly-acclaimed training on Microsoft Directory & Identity technologies, TEC 2010 will bring back a full agenda of Exchange training and the first ever TEC for SharePoint! As one of the Identity experts Martin Kuppinger (Kuppinger Cole) discusses in his presentation “Provisioning Architectures More

Conference

The Experts Conference Europe

The Experts Conference (TEC) 2010 kommt dieses Jahr nach Düsseldorf! TEC 2010 Europe bietet erstklassiges Training und Networking – für Experten, von Experten – und vermittelt Ihnen Wissen über effektive, innovative Möglichkeiten, die Technologien, die tagtäglich Ihre Geschäftsprozesse unterstützen, zu verwalten. Zusätzlich zu den etablierten Trainings zu Microsoft Directory & Identity Technologien wird es auf der TEC 2010 wieder zahlreiche Exchange Vorträge und zum ersten Mal ebenfalls SharePoint Sessions geben. More

Seminar

Durchgängiger Schutz statt Stückwerk - Informationen richtig schützen

Wie kann man Informationen in allen Nutzungssituationen ("at rest, in move, in use") optimal und zuverlässig schützen? Information Rights Management ist hier einer der strategisch wichtigsten Ansätze und ein Kernelement in Strategien für die Informationssicherheit. More

Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. More

Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype. More

Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an More

Workshop

Kantara Initiative Public Workshop: Making the World Safe for User-Managed Access

This workshop will review User Managed Access (UMA) benefits, use cases, progress to date, and next steps. It is co-located with the European Identity Conference. Registration for the workshop is free. More

Workshop

EEMA Public Workshop: Cloud Computing Services

This Cloud Computing introduction and tutorial is invaluable for delegates who wish to learn and increase their knowledgebase. It is aimed at all stakeholders who have an influence on policy and the impact on commercial and business applications and services. More

2009

Seminar

Governance, Risk und Compliance – mehr als nur Regeln

Zuverlässigkeit ist das wichtigste Merkmal einer guten Identitäts- und Sicherheitsmanagementlösung. Mit der schriftlichen Niederlegung der Management- und Sicherheitsverfahren allein ist es aber nicht getan – Sie müssen die Gewissheit haben, dass Sie mit der gewählten Lösung auch alle Richtlinien und Vorschriften erfüllen, umsetzen und kontrollieren können. Das Ziel heißt „Making IT Work As One!“ More

Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. More

Workshop

Information Card Foundation (German Chapter) Meeting

2008

Seminar

Enterprise Identity Management Best Practices

In einer jungen Disziplin wie der des Identity Management ist es ganz besonders wichtig, sich regelmäßig über aktuelle Entwicklungen zu informieren und sich mit Projektverantwortlichen anderer Unternehmen auszutauschen. Diese 2-tägige, von Martin Kuppinger moderierte Veranstaltung kombiniert Informationen zu aktuellen Trends mit Best Practices und der unabhänigen, neutralen Expertise von Kuppinger Cole. More

Conference

Governance, Risk Management & Compliance (GRC) Forum 2008

Je komplexer die IT-Infrastruktur, desto angreifbarer ist sie und desto höher die Aufwände (und Kosten) für Compliance. Für die erfolgreiche Einführung einer unternehmensweiten GRC-Plattform ist es deshalb von entscheidender Bedeutung, einerseits deren Fundament in Form einer zukunftsorientierten Identity Management Strategie darauf auszulegen, aussagekräftige Informationen zur Verfügung zu stellen, und andererseits durch einen Risk-orientierten Compliance-Ansatz die Kunst der Beschränkung auf das Wesentliche zu üben. Die Kuppinger Cole Governance, Risk Management & Compliance (GRC) More

Conference

Identitycamp Bremen

Das Identitycamp Bremen wird das erste Barcamp in Deutschland speziell zum Themenbereich Identity 2.0, Single-Sign-On, Reputationsmanagement, Beziehungsmanagement, Privacy 2.0 und Verwandtes sein. More

Congress

European Identity Conference 2008

For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event. More

Workshop

Liberty Alliance Standards Workshop

Co-located with the European Identity Conference 2008, Liberty Alliance will be hosting a workshop with worldwide renown identity management thought leaders like Conor Cahill (Intel), Fulup Ar Fol (Sun), Robin Wilton (Sun) and Patrick Harding (Ping Identity), and with great best practices from France Telecom /Orange, AOL and Deutsche Telekom. This workshop is organised by Liberty Alliance. Registration for this workshop is free and it is open to everyone. More

Conference

VRM 2008

VRM, or Vendor Relationship Management, is the reciprocal of CRM or Customer Relationship Management. It provides customers with tools for engaging with vendors in ways that work for both parties. VRM 2008 is an unconference, where the content of the sessions is created and managed by the participants rather than in advance of the event. Registration for VRM 2008 is free. More

2007

Seminar

Identity Management im SAP-Umfeld

Mit dem Zukauf von Maxware hat SAP für Aufsehen gesorgt. Dennoch stellt sich die Frage, welcher Ansatz für das Identity Management der richtige ist, wenn (neben anderen IT-Systemen) SAP-Systeme eingesetzt werden. More

Seminar

Governance, Risk, Compliance (GRC) & Identity Management

Das unternehmensweite Risikomanagement, das nachhaltige Steuern des Unternehmens durch Kodizes und Richtlinien (?Governance?) und das systematische Streben nach dem Einhalten externer und interner Regelwerke (?Compliance?) verändern grundlegend die Anforderungen der Unternehmensführung an IT-Infrastruktur und Anwendungen. Welchen Hintergrund diese veränderten Anforderungen haben, wie sie sich auf die IT auswirken und welche zentrale Rolle das Identity Management dabei spielt, zeigt Ihnen dieses Seminar auf. More

Congress

European Identity Conference 2007

Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning More

Next Conference

Conference

Consumer Identity World Tour 2017

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Next Webinar

Webinar

GDPR Compliance Countdown to Adequacy – Minimum Preparation to be Compliant

With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds.

Popular Webcasts

Hot Topics